Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp872234ybl; Wed, 21 Aug 2019 06:51:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqw81Koae18giOl3NGsfz/x1hgP2VZu631HpwDa5oWAwyB+FyERRY613sS6p3fSq4XJbOjUo X-Received: by 2002:a62:83c9:: with SMTP id h192mr34948038pfe.57.1566395512372; Wed, 21 Aug 2019 06:51:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566395512; cv=none; d=google.com; s=arc-20160816; b=hv+ifIVOLacnwYdR1j+UtcLWJNu8QePSh0GbNpNT9hbRHNfp1xlweAWcsTYIQq3hyN aHllHuv7YLhL1PycAnC5DXLY6IeNyrLSfJpAS3d8GmUYwooAA1Vbs/cExCqSHkxdZoH9 8dzLSuMJI4r8jK7ElC+i6ePku20AfcUb3hg5owi7Tx3IVlUdhZgfLonVTZ6nkKPnp0CG TtZCRSf0lC+IhLic6dqOU0ptLSdZcX4dK1fUgCqAjHv2YaqBbfryH2K/KBd44UsrAT3X 6ahngJoMGI6xuUyBE1krP6BQTrgMLG9DiHbSjdkPDpfBD0O+bIpQF2YFZNQ7IyigSIKS LzQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=RV0xxNarpiKQ8ERDVScmRRh4culrfEU3HCkR8qDMBR4=; b=Qt+9KwO/HT3J/UaGExoIRSx6/HtbMcr3ymeJqWomxcrdT91hTmKzIkYR8DIZ+nrinF 90aMO0q6d7OxOAG2ZuteqIuCbCQSzmUhEP1IrtkNBgHTlTjUAImnqFEeEI6lV0s3YZga O803I94M2cSHGZvHcGGcx+VZ/5sojTdTSEcmXXd5bPhqxVEP8xdrwjTKyir23a/KlwYf GLNDtKdForFLhEEHzQPhOiKGF3I6UVj57mxJ7yWIM01qm41q/BxzCkbtTUe6T3UFtNO8 ydoV1LL+Nvj5u9NpxP7ncOBKdEbl6fcNZnEGv4f+Vr3Qn/kXWL7RET43QeY9CtdHYFEt nkNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cp4si8392438plb.330.2019.08.21.06.51.37; Wed, 21 Aug 2019 06:51:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728940AbfHUNug (ORCPT + 99 others); Wed, 21 Aug 2019 09:50:36 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:55781 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727949AbfHUNug (ORCPT ); Wed, 21 Aug 2019 09:50:36 -0400 Received: from p5de0b6c5.dip0.t-ipconnect.de ([93.224.182.197] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1i0R0T-0005Vo-Ux; Wed, 21 Aug 2019 15:50:34 +0200 Date: Wed, 21 Aug 2019 15:50:33 +0200 (CEST) From: Thomas Gleixner To: Sebastian Andrzej Siewior cc: Julien Grall , linux-rt-users@vger.kernel.org, linux-kernel@vger.kernel.org, maz@kernel.org, rostedt@goodmis.org Subject: Re: [RT PATCH 1/3] hrtimer: Use READ_ONCE to access timer->base in hrimer_grab_expiry_lock() In-Reply-To: <20190821134437.efc3cs55o7uatrpj@linutronix.de> Message-ID: References: <20190821092409.13225-1-julien.grall@arm.com> <20190821092409.13225-2-julien.grall@arm.com> <20190821134437.efc3cs55o7uatrpj@linutronix.de> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 21 Aug 2019, Sebastian Andrzej Siewior wrote: > On 2019-08-21 10:24:07 [+0100], Julien Grall wrote: > > The update to timer->base is protected by the base->cpu_base->lock(). > > However, hrtimer_grab_expirty_lock() does not access it with the lock. > > > > So it would theorically be possible to have timer->base changed under > > our feet. We need to prevent the compiler to refetch timer->base so the > > check and the access is performed on the same base. > > It is not a problem if the timer's bases changes. We get here because we > want to help the timer to complete its callback. > The base can only change if the timer gets re-armed on another CPU which > means is completed callback. In every case we can cancel the timer on > the next iteration. It _IS_ a problem when the base changes and the compiler reloads CPU0 CPU1 base = timer->base; lock(base->....); switch base reload base = timer->base; unlock(base->....); See?